Andreas Jacobsson

Learn More
Personal privacy is affected by the occurrence of adware and spyware in peer-to-peer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet. Although there was no exchange of files by way of the file-sharing(More)
The amount of software that hosts spyware has increased dramatically. To avoid legal repercussions, the vendors need to inform users about inclusion of spyware via end user license agreements (EULAs) during the installation of an application. However, this information is intentionally written in a way that is hard for users to comprehend. We investigate how(More)
Several barriers to turn innovative ideas into growth-oriented businesses with a global outlook are identified. The Plug and Play Business concept is suggested to lower these barriers by making it possible for the innovator to plug into a network of actors or potential collaborators with automated entrepreneurial functions. A P2P paradigm with intelligent(More)
The amount of spyware increases rapidly over the Internet and it is usually hard for the average user to know if a software application hosts spyware. This paper investigates the hypothesis that it is possible to detect from the end user license agreement (EULA) whether its associated software hosts spyware or not. We generated a data set by collecting 100(More)
The significance of electronic information exchange in inter-organizational cooperation is well-known. We will here focus on the particular requirements of SMEs. We describe a general " wrapper agent " solution based on open source freeware that makes it possible (in principle) for any business system to exchange information with any other business system.(More)
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may interfuse. E-mail marketing, remote control and information gathering are replaced by spam, virulent programs and spyware. In this paper, we use the concepts of information ecosystems(More)